hashlookup / hashlookup-forensic-analyserLinks
Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
☆127Updated 2 years ago
Alternatives and similar repositories for hashlookup-forensic-analyser
Users that are interested in hashlookup-forensic-analyser are comparing it to the libraries listed below
Sorting:
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- A collection of tips for using MISP.☆75Updated 11 months ago
- Digital Forensics Artifacts Knowledge Base☆88Updated last week
- TAPIR is a multi-user, client/server, incident response framework☆47Updated 3 years ago
- ☆100Updated last month
- Python library for threat intelligence☆91Updated 10 months ago
- An open source platform to support analysts to organise their case and tasks☆113Updated last week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆75Updated 4 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆88Updated last month
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated last week
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆185Updated 2 months ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆112Updated 2 weeks ago
- Dictionary of CTI-related acronyms, terms, and jargon☆145Updated last week
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆79Updated 6 months ago
- Remote access and Antivirus Logging Database☆44Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- The core backend server handling API requests and task management☆53Updated this week
- a common schema for internet-connected service discovery 🔎 📚☆22Updated this week
- Collection of Dashboards for Threat Hunting and more!☆70Updated 5 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- ReWrite of AChoir in Go for Cross Platform☆42Updated last week
- CSIRT Jump Bag☆26Updated last year